Cubicle vs. the Coffee Shop
Behavioral Modes in (Enterprise) End-Users
Frederic Giroire Jaideep Chandrashekar Gianluca Iannaccone Dina Papagiannaki Eve Schooler Nina Taft Intel Research/ INRIA
Cubicle vs. the Coffee Shop Behavioral Modes in (Enterprise) - - PowerPoint PPT Presentation
Cubicle vs. the Coffee Shop Behavioral Modes in (Enterprise) End-Users Frederic Giroire Jaideep Chandrashekar Gianluca Iannaccone Dina Papagiannaki Eve Schooler Nina Taft Intel Research/ INRIA Motivation Previous studies of user
Frederic Giroire Jaideep Chandrashekar Gianluca Iannaccone Dina Papagiannaki Eve Schooler Nina Taft Intel Research/ INRIA
collected “in-network”
hosts
how different in another?
in any of the environments?
build
network)
deactivated
identify individual users
discarded
enterprise
infrastructure services
services
vpn inside
vpn inside
Deskbound employees? road warriors?
bob carl alice eve
bob carl alice eve
Time ➞
#Connections
at work at home
exploit gap
detector threshold
allow a larger operating region for malicious traffic to go undetected
Current security mechanisms static thresholds ignore location context
Time ➞
#Connections
at work at home
exploit gap
detector threshold
allow a larger operating region for malicious traffic to go undetected
Current security mechanisms static thresholds ignore location context
examples (conns/min) Zapchast (0-20) SDbot C&C (0-50)
bob carl alice eve
fraction of connections for web traffic (80,8080,8888)
relatively more http traffic when INSIDE
fraction of connections for Microsoft traffic
low volume of traffic on these ports when INSIDE
low volume of traffic on these ports when INSIDE
less popular
m
e p
u l a r
a different view-- “popularity” of the protocols